Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-22Publicly Accessible Content

Designate individuals authorized to make information publicly accessible; Train authorized individuals to ensure that publicly accessible information does not contain nonpublic information; Review the proposed content of information prior to posting onto the publicly accessible system to ensure that nonpublic information is not included; and Review the content on the publicly accessible system for nonpublic information {{ insert: param, ac-22_odp }} and remove such information, if discovered.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-200Exposure of Sensitive Information to an Unauthorized Actor10,204Review and removal of nonpublic information from publicly accessible systems directly prevents exposure of sensitive data to unauthorized actors.
CWE-284Improper Access Control4,832Designating authorized individuals and mandating pre/post-publication reviews enforces access controls on who can publish content publicly.
CWE-285Improper Authorization1,230Authorization checks via training and content reviews ensure only approved information is released to public systems.
CWE-668Exposure of Resource to Wrong Sphere779The control ensures information resources are not exposed to the incorrect (public) sphere through review and authorization.
CWE-552Files or Directories Accessible to External Parties540Controls on authorized publication limit files and directories with nonpublic data from becoming accessible to external parties.
CWE-497Exposure of Sensitive System Information to an Unauthorized Control Sphere314Ongoing reviews detect and remove sensitive system information before it reaches publicly accessible systems.
CWE-359Exposure of Private Personal Information to an Unauthorized Actor174Preventing nonpublic personal information from public posting reduces unauthorized exposure of private personal data.
CWE-538Insertion of Sensitive Information into Externally-Accessible File or Directory84Pre- and post-publication reviews prevent insertion of sensitive information into externally-accessible public locations.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-117497.19.80.8539good
CVE-2024-113964.35.30.5417good
CVE-2024-120083.15.30.3348good
CVE-2025-92093.19.80.1876good
CVE-2025-116933.09.80.1677good
CVE-2025-708412.010.00.0010good
CVE-2020-370822.09.80.0032good
CVE-2026-222372.09.80.0062good
CVE-2025-125392.010.00.0072good
CVE-2025-548632.010.00.0011good
CVE-2026-21441.68.10.0011good
CVE-2024-123301.67.50.0101good
CVE-2025-672231.57.50.0015good
CVE-2024-122741.57.50.0051good
CVE-2025-276041.57.50.0059good
CVE-2024-135621.57.50.0059good
CVE-2024-136061.57.50.0029good
CVE-2024-135681.57.50.0019good
CVE-2024-136111.57.50.0021good
CVE-2026-412781.57.50.0004good
CVE-2026-278771.36.50.0002good
CVE-2024-136381.25.90.0021good
CVE-2026-20253.27.50.2799good
CVE-2024-136092.25.90.1770good
CVE-2019-257092.09.80.0038good

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-16 AC-17 AC-18 AC-19 AC-2 AC-20 AC-21 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9